Secure lightweight client for cloud-based E-Health Model
A strict requirement for the security and privacy of Electronic Health Records (EHRs) is a primary issue for realizing a secure eHealth system. Based on an investigation of medical modes and a questionnaire survey on 114 medical practitioners of several of China's tertiary hospitals, the medica...
| Main Author: | Zhang, Xiaowei |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/119863/ http://psasir.upm.edu.my/id/eprint/119863/1/119863.pdf |
Similar Items
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Privacy preserving for electronic health record systems
by: Yussuf, Zakariye Mohamed
Published: (2019)
by: Yussuf, Zakariye Mohamed
Published: (2019)
Visualisation of electronic health records
by: Wang, Qiru
Published: (2025)
by: Wang, Qiru
Published: (2025)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Blockchain-based electronic health record system
by: Saleh Habtor, Saleh Abdulaziz
Published: (2019)
by: Saleh Habtor, Saleh Abdulaziz
Published: (2019)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Adaptive artificial neural network for power system security assessment and control action
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
by: Al-Masri, Ahmed Naufal A.
Published: (2012)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Dasar Keselamatan ICT Universiti Teknologi MARA / Pejabat Infrastruktur dan Infostruktur, UiTM
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
by: Abkooh, Elaheh Taheri
Published: (2016)
by: Abkooh, Elaheh Taheri
Published: (2016)
Technical challenges of providing record linkage services for research
by: Boyd, James, et al.
Published: (2014)
by: Boyd, James, et al.
Published: (2014)
A survey on SLA and performance measurement in cloud computing
by: Alhamad, Mohammed, et al.
Published: (2011)
by: Alhamad, Mohammed, et al.
Published: (2011)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Java - based Sony Ericsson phone book manager using bluetooth / Farahani Che Khosni
by: Che Khosni, Farahani
Published: (2005)
by: Che Khosni, Farahani
Published: (2005)
Announcement system using wap over bluetooth / Azhan Ezra Abdul Aziz
by: Abdul Aziz, Azhan Ezra
Published: (2006)
by: Abdul Aziz, Azhan Ezra
Published: (2006)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
The effect of data cleaning on record linkage quality
by: Randall, Sean, et al.
Published: (2013)
by: Randall, Sean, et al.
Published: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Similar Items
-
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018) -
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017) -
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012) -
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015) -
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)